• Home
  • Features
  • Pricing
  • Docs
  • Announcements
  • Sign In

randombit / botan / 5587103969

18 Jul 2023 12:36PM UTC coverage: 91.691% (-0.06%) from 91.749%
5587103969

push

github

randombit
Merge GH #3622 Extend Credentials_Manager to support TLS 1.3 PSK

78319 of 85416 relevant lines covered (91.69%)

12316990.45 hits per line

Source File
Press 'n' to go to next uncovered line, 'b' for previous

32.86
/src/fuzzer/tls_server.cpp
1
/*
2
* (C) 2015,2016 Jack Lloyd
3
*
4
* Botan is released under the Simplified BSD License (see license.txt)
5
*/
6

7
#include "fuzzers.h"
8

9
#include <botan/data_src.h>
10
#include <botan/hex.h>
11
#include <botan/pkcs8.h>
12
#include <botan/tls_server.h>
13
#include <botan/tls_session_manager_noop.h>
14

15
#include <memory>
16

17
namespace {
18

19
const char* const fixed_rsa_key =
20
   "-----BEGIN PRIVATE KEY-----\n"
21
   "MIIEvgIBADANBgkqhkiG9w0BAQEFAASCBKgwggSkAgEAAoIBAQCe6qqpMQVJ7zCJ\n"
22
   "oSnpxia0yO6M7Ie3FGqPcd0DzueC+kWPvuHQ+PpP5vfO6qqRaDVII37PFX5NUZQm\n"
23
   "GK/rAm7spjIHTCMgqSZ8pN13LU8m1gDwIdu9al16LXN9zZjB67uLlFn2trtLi234\n"
24
   "i0cnyeF8IC0cz7tgCOzMSVEBcqJjkdgGrZ3WUgOXecVm2lXVrYlEiaSxFp4VOE9k\n"
25
   "RFeVrELCjmNtc4hRd1yJsF+vObCtvyqGYQE1Qcb0MVSQDBHMkiUVmO6zuW7td5ef\n"
26
   "O/1OyntQJGyVa+SnWbkSLCybta2J7MreHENrF5GA0K1KL140SNRHeWifRMuNQua7\n"
27
   "qmKXMBTFAgMBAAECggEAIk3fxyQI0zvpy1vZ01ft1QqmzA7nAPNMSWi33/GS8iga\n"
28
   "SfxXfKeySPs/tQ/dAARxs//NiOBH4mLgyxR7LQzaawU5OXALCSraXv+ruuUx990s\n"
29
   "WKnGaG4EfbJAAwEVn47Gbkv425P4fEc91vAhzQn8PbIoatbAyOtESpjs/pYDTeC/\n"
30
   "mnJId8gqO90cqyRECEMjk9sQ8iEjWPlik4ayGlUVbeeMu6/pJ9F8IZEgkLZiNDAB\n"
31
   "4anmOFaT7EmqUjI4IlcaqfbbXyDXlvWUYukidEss+CNvPuqbQHBDnpFVvBxdDR2N\n"
32
   "Uj2D5Xd5blcIe2/+1IVRnznjoQ5zvutzb7ThBmMehQKBgQDOITKG0ht2kXLxjVoR\n"
33
   "r/pVpx+f3hs3H7wE0+vrLHoQgkVjpMWXQ47YuZTT9rCOOYNI2cMoH2D27t1j78/B\n"
34
   "9kGYABUVpvQQ+6amqJDI1eYI6e68TPueEDjeALfSCdmPNiI3lZZrCIK9XLpkoy8K\n"
35
   "tGYBRRJ+JJxjj1zPXj9SGshPgwKBgQDFXUtoxY3mCStH3+0b1qxGG9r1L5goHEmd\n"
36
   "Am8WBYDheNpL0VqPNzouhuM/ZWMGyyAs/py6aLATe+qhR1uX5vn7LVZwjCSONZ4j\n"
37
   "7ieEEUh1BHetPI1oI5PxgokRYfVuckotqVseanI/536Er3Yf2FXNQ1/ceVp9WykX\n"
38
   "3mYTKMhQFwKBgQDKakcXpZNaZ5IcKdZcsBZ/rdGcR5sqEnursf9lvRNQytwg8Vkn\n"
39
   "JSxNHlBLpV/TCh8lltHRwJ6TXhUBYij+KzhWbx5FWOErHDOWTMmArqtp7W6GcoJT\n"
40
   "wVJWjxXzp8CApYQMWVSQXpckJL7UvHohZO0WKiHyxTjde5aD++TqV2qEyQKBgBbD\n"
41
   "jvoTpy08K4DLxCZs2Uvw1I1pIuylbpwsdrGciuP2s38BM6fHH+/T4Qwj3osfDKQD\n"
42
   "7gHWJ1Dn/wUBHQBlRLoC3bB3iZPZfVb5lhc2gxv0GvWhQVIcoGi/vJ2DpfJKPmIL\n"
43
   "4ZWdg3X5dm9JaZ98rVDSj5D3ckd5J0E4hp95GbmbAoGBAJJHM4O9lx60tIjw9Sf/\n"
44
   "QmKWyUk0NLnt8DcgRMW7fVxtzPNDy9DBKGIkDdWZ2s+ForICA3C9WSxBC1EOEHGG\n"
45
   "xkg2xKt66CeutGroP6M191mHQrRClt1VbEYzQFX21BCk5kig9i/BURyoTHtFiV+t\n"
46
   "kbf4VLg8Vk9u/R3RU1HsYWhe\n"
47
   "-----END PRIVATE KEY-----\n";
48

49
const char* const fixed_rsa_cert =
50
   "-----BEGIN CERTIFICATE-----\n"
51
   "MIIDUDCCAjgCCQD7pIb1ZsoafjANBgkqhkiG9w0BAQsFADBqMQswCQYDVQQGEwJW\n"
52
   "VDEQMA4GA1UECAwHVmVybW9udDEWMBQGA1UEBwwNVGhlIEludGVybmV0czEUMBIG\n"
53
   "A1UECgwLTWFuZ29zIFIgVXMxGzAZBgNVBAMMEnNlcnZlci5leGFtcGxlLmNvbTAe\n"
54
   "Fw0xNjAxMDYxNzQ3MjNaFw0yNjAxMDMxNzQ3MjNaMGoxCzAJBgNVBAYTAlZUMRAw\n"
55
   "DgYDVQQIDAdWZXJtb250MRYwFAYDVQQHDA1UaGUgSW50ZXJuZXRzMRQwEgYDVQQK\n"
56
   "DAtNYW5nb3MgUiBVczEbMBkGA1UEAwwSc2VydmVyLmV4YW1wbGUuY29tMIIBIjAN\n"
57
   "BgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAnuqqqTEFSe8wiaEp6cYmtMjujOyH\n"
58
   "txRqj3HdA87ngvpFj77h0Pj6T+b3zuqqkWg1SCN+zxV+TVGUJhiv6wJu7KYyB0wj\n"
59
   "IKkmfKTddy1PJtYA8CHbvWpdei1zfc2Yweu7i5RZ9ra7S4tt+ItHJ8nhfCAtHM+7\n"
60
   "YAjszElRAXKiY5HYBq2d1lIDl3nFZtpV1a2JRImksRaeFThPZERXlaxCwo5jbXOI\n"
61
   "UXdcibBfrzmwrb8qhmEBNUHG9DFUkAwRzJIlFZjus7lu7XeXnzv9Tsp7UCRslWvk\n"
62
   "p1m5Eiwsm7WtiezK3hxDaxeRgNCtSi9eNEjUR3lon0TLjULmu6pilzAUxQIDAQAB\n"
63
   "MA0GCSqGSIb3DQEBCwUAA4IBAQA1eZGc/4V7z/E/6eG0hVkzoAZeuTcSP7WqBSx+\n"
64
   "OP2yh0163UYjoa6nehmkKYQQ9PbYPZGzIcl+dBFyYzy6jcp0NdtzpWnTFrjl4rMq\n"
65
   "akcQ1D0LTYjJXVP9G/vF/SvatOFeVTnQmLlLt/a8ZtRUINqejeZZPzH8ifzFW6tu\n"
66
   "mlhTVIEKyPHpxClh5Y3ubw/mZYygekFTqMkTx3FwJxKU8J6rYGZxanWAODUIvCUo\n"
67
   "Fxer1qC5Love3uWl3vXPLEZWZdORnExSRByzz2immBP2vX4zYZoeZRhTQ9ae1TIV\n"
68
   "Dk02a/1AOJZdZReDbgXhlqaUx5pk/rzo4mDzvu5HSCeXmClz\n"
69
   "-----END CERTIFICATE-----\n";
70

71
class Fuzzer_TLS_Server_Creds : public Botan::Credentials_Manager {
72
   public:
73
      Fuzzer_TLS_Server_Creds() {
1,128✔
74
         Botan::DataSource_Memory cert_in(fixed_rsa_cert);
1,128✔
75
         m_rsa_cert = std::make_unique<Botan::X509_Certificate>(cert_in);
1,128✔
76

77
         Botan::DataSource_Memory key_in(fixed_rsa_key);
1,128✔
78
         m_rsa_key.reset(Botan::PKCS8::load_key(key_in).release());
2,256✔
79
      }
2,256✔
80

81
      std::vector<Botan::X509_Certificate> cert_chain(
×
82
         const std::vector<std::string>& algos,
83
         const std::vector<Botan::AlgorithmIdentifier>& /*signature_schemes*/,
84
         const std::string& /*type*/,
85
         const std::string& /*hostname*/) override {
86
         std::vector<Botan::X509_Certificate> v;
×
87

88
         for(const auto& algo : algos) {
×
89
            if(algo == "RSA") {
×
90
               v.push_back(*m_rsa_cert);
×
91
               break;
92
            }
93
         }
94

95
         return v;
×
96
      }
×
97

98
      std::shared_ptr<Botan::Private_Key> private_key_for(const Botan::X509_Certificate& /*cert*/,
×
99
                                                          const std::string& type,
100
                                                          const std::string& /*context*/) override {
101
         if(type == "RSA") {
×
102
            return m_rsa_key;
×
103
         }
104
         return nullptr;
×
105
      }
106

107
      Botan::secure_vector<uint8_t> session_ticket_key() override {
×
108
         return Botan::hex_decode_locked("AABBCCDDEEFF00112233445566778899");
×
109
      }
110

111
      Botan::secure_vector<uint8_t> dtls_cookie_secret() override {
×
112
         return Botan::hex_decode_locked("AABBCCDDEEFF00112233445566778899");
×
113
      }
114

115
      std::string psk_identity_hint(const std::string&, const std::string&) override { return "psk_hint"; }
×
116

117
      std::string psk_identity(const std::string&, const std::string&, const std::string&) override { return "psk_id"; }
×
118

119
      std::vector<Botan::TLS::ExternalPSK> find_preshared_keys(
×
120
         std::string_view host,
121
         Botan::TLS::Connection_Side whoami,
122
         const std::vector<std::string>& identities = {},
123
         const std::optional<std::string>& prf = std::nullopt) override {
124
         if(!identities.empty() && std::find(identities.begin(), identities.end(), "psk_id") == identities.end()) {
×
125
            return Botan::Credentials_Manager::find_preshared_keys(host, whoami, identities, prf);
×
126
         }
127

128
         std::vector<Botan::TLS::ExternalPSK> psks;
×
129
         psks.emplace_back("psk_id", "SHA-256", Botan::hex_decode_locked("AABBCCDDEEFF00112233445566778899"));
×
130
         return psks;
×
131
      }
×
132

133
   private:
134
      std::unique_ptr<Botan::X509_Certificate> m_rsa_cert;
135
      std::shared_ptr<Botan::Private_Key> m_rsa_key;
136
};
137

138
class Fuzzer_TLS_Policy : public Botan::TLS::Policy {
2,256✔
139
   public:
140
      // TODO: Enable this once the TLS 1.3 server implementation is ready.
141
      //       Maybe even build individual fuzz targets for different versions.
142
      bool allow_tls13() const override { return false; }
1,107✔
143

144
      std::vector<uint16_t> ciphersuite_list(Botan::TLS::Protocol_Version) const override {
×
145
         std::vector<uint16_t> ciphersuites;
×
146

147
         for(auto&& suite : Botan::TLS::Ciphersuite::all_known_ciphersuites()) {
×
148
            if(suite.valid()) {
×
149
               ciphersuites.push_back(suite.ciphersuite_code());
×
150
            }
151
         }
152

153
         return ciphersuites;
×
154
      }
×
155
};
156

157
class Fuzzer_TLS_Server_Callbacks : public Botan::TLS::Callbacks {
2,256✔
158
   public:
159
      void tls_emit_data(std::span<const uint8_t>) override {
×
160
         // discard
161
      }
×
162

163
      void tls_record_received(uint64_t, std::span<const uint8_t>) override {
×
164
         // ignore peer data
165
      }
×
166

167
      void tls_alert(Botan::TLS::Alert) override {
×
168
         // ignore alert
169
      }
×
170

171
      std::string tls_server_choose_app_protocol(const std::vector<std::string>& client_protos) override {
×
172
         if(client_protos.size() > 1) {
×
173
            return client_protos[0];
×
174
         } else {
175
            return "fuzzy";
×
176
         }
177
      }
178

179
      void tls_verify_cert_chain(const std::vector<Botan::X509_Certificate>& cert_chain,
×
180
                                 const std::vector<std::optional<Botan::OCSP::Response>>& ocsp_responses,
181
                                 const std::vector<Botan::Certificate_Store*>& trusted_roots,
182
                                 Botan::Usage_Type usage,
183
                                 std::string_view hostname,
184
                                 const Botan::TLS::Policy& policy) override {
185
         try {
×
186
            // try to validate to exercise those code paths
187
            Botan::TLS::Callbacks::tls_verify_cert_chain(
×
188
               cert_chain, ocsp_responses, trusted_roots, usage, hostname, policy);
189
         } catch(...) {
×
190
            // ignore validation result
191
         }
×
192
      }
×
193
};
194

195
}  // namespace
196

197
void fuzz(const uint8_t in[], size_t len) {
1,131✔
198
   if(len <= 1) {
1,131✔
199
      return;
3✔
200
   }
201

202
   auto session_manager = std::make_shared<Botan::TLS::Session_Manager_Noop>();
1,128✔
203
   auto policy = std::make_shared<Fuzzer_TLS_Policy>();
1,128✔
204
   Botan::TLS::Server_Information info("server.name", 443);
1,128✔
205
   auto creds = std::make_shared<Fuzzer_TLS_Server_Creds>();
1,128✔
206
   auto callbacks = std::make_shared<Fuzzer_TLS_Server_Callbacks>();
1,128✔
207

208
   const bool is_datagram = in[0] & 1;
1,128✔
209

210
   Botan::TLS::Server server(callbacks, session_manager, creds, policy, fuzzer_rng_as_shared(), is_datagram);
6,768✔
211

212
   try {
1,128✔
213
      server.received_data(in + 1, len - 1);
1,128✔
214
   } catch(std::exception& e) {}
1,105✔
215
}
5,640✔
STATUS · Troubleshooting · Open an Issue · Sales · Support · CAREERS · ENTERPRISE · START FREE · SCHEDULE DEMO
ANNOUNCEMENTS · TWITTER · TOS & SLA · Supported CI Services · What's a CI service? · Automated Testing

© 2025 Coveralls, Inc